期刊文献+

大规模网络高速扫描系统的设计与实现

Design and implementation of large-scale network scanning system
下载PDF
导出
摘要 大规模网络扫描在网络安全领域有许多应用,包括漏洞发现,追踪采取的网络防御机制等。但是,现有的网络扫描工具在大规模网络扫描方面存在使用困难和速度缓慢的问题。本文在对主流的网络扫描技术和主流的网络扫描工具的深入研究与分析的基础上,设计实现了针对大规模网络的高速扫描系统。系统基于zmap工具的高速扫描技术,设计整合了存活性扫描、端口扫描和应用层服务扫描等全面多样的扫描功能,其扫描速度和功能完整性相对传统扫描工具有了较大提高。本文还对多种扫描应用场景进行了验证与实验分析,结果显示本系统相对传统方法效率提高显著。 Large-scale network scanning has many network security applications,including vulnerability discovery and tracking network defense mechanisms. However,the existing network scanning tools have some difficulties and slowness in terms of largescale network scanning. Based on the research and analysis of widely used network scanning technology and tools,the paper designs a large-scale network scanning system. This system is based on the scanning technology of zmap,and implements variety of scanning mode such as survivability scanning,port scanning,application-level service scanning and so on. Compared with traditional tools,scanning speed and functional completeness of this system have been greatly improved. Finally,the paper conducts multiple tests in different scanning application scenes,and the experimental results showthat the efficiency of the system is much higher than that of traditional tools.
作者 郝科委 余翔湛 赵洋 HAO Kewei;YU Xiangzhan;ZHAO Yang(School of Computer Science and Technology,Harbin Institute of Technology,Harbin 150001,China)
出处 《智能计算机与应用》 2018年第5期112-117,共6页 Intelligent Computer and Applications
基金 国家自然科学基金(61771166) 国家重点研发计划项目(2016QY05X1000)
关键词 大规模网络 网络扫描 高速 large-scale network network scanning high-speed
  • 相关文献

参考文献3

二级参考文献15

  • 1刘强.网络恐怖主义的特性、现状及发展趋势[J].世界经济与政治论坛,2004(4):52-56. 被引量:18
  • 2朱永彪,杨恕.网络恐怖主义问题初探[J].中州学刊,2006(5):140-142. 被引量:15
  • 3谭毓安.网络攻击防护编码设计[M].北京:北京希望电子出版社,2002..
  • 4Ofir Arkin, Fyodor Yarochkin, Meder Kydyraliev. The present and future of Xprobe2 the next generation of active operating system fmgerprinting[EB/OL].http://www. sys-security. com.
  • 5Fyodor. The art of scanning [EB/OL]. Phrack 51, http://www.phrack. com.
  • 6Fyodor. Remote OS detection via TCP/IP stack finger-printing [EB/OL].Phrack 54,http://www.phrack.com.
  • 7Ofir Arkin, Fyodor Yarochkin. ICMP based remote OS TCP/IP stack fingerprinting techniques [EB/OL]. Phrack 57,2001-08.http://www. sys-security. com.
  • 8Douglas E Comer.用TCP/IP进行网际互联(第1卷)原理、协议与结构[M].第4版.北京:电子工业出版社,2001.
  • 9潘从武:《新疆出重拳严惩传播“东突”暴力恐怖音视频》,http://military.china.com/news/568/20140521/18515272.html.
  • 10顾建国:《中国政府采取多种手段打击网络恐怖主义》,http://media.people.com.cn/n/2014/1120/c120837-26059821-2.html.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部